-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Understanding #Trivy Scan Discrepancies in EKS Pods #6473
Comments
Hi @chen-keinan, is there any update to this issue? |
as discussed, the severity field will be removed from compliance reports. To match cis specifications |
There should be some indication of severities that should tell us if there is any HIGH or a CRITICAL finding that needs to be fixed. Without a severity, I am not sure what would be the significance of scanning a kubernetes deployment or a pod using |
@chen-keinan, the summary report with severities are fine as it displays the highest severity of the IaC checks within a particular control check. The real issue is with the detailed report ( |
@avaniicf following to our discussion I came to a conclusion that adding severity to compliance report is unnecessary and do not comply to official cis-benchmarks specs as shown. IaC checks still will have severities and can be assess the cluster with the usual command and you'll get results which you can filter with severity : however the compliance cis report IMHO should no include severities as it cause confusion and do not comply to cis-benchmark specifications |
Hi @chen-keinan, I understand your perspective of not using severity in compliance reports and how it aligns with CIS benchmark specifications. To clarify further-
|
@avaniicf
Or you can run it with default scanners and youll get vulns and secrets results as well
|
@chen-keinan, okay then what about my 2nd question in my previous reply - Does scanning with |
Discussed in #6470
Originally posted by avaniicf April 8, 2024
Description
Hi #trivy, we’ve been using Trivy to scan our EKS pods that deploy our application containers. Upon running a summary report against the pods, it’s indicating a HIGH severity with 4 failed checks. To delve into the specifics of these HIGH findings, we’ve conducted a detailed report on the same pods. However, we’ve noticed that the detailed report doesn’t explicitly list any HIGH findings. Upon closer examination, we discovered that certain vulnerabilities categorized as LOW in the detailed report are contributing to the overall HIGH severity indicated in the summary.
Desired Behavior
We expect to see a detailed report that resonates with the summary report provided by trivy scans.
If Summary shows a HIGH finding with 4 failed checks, we would expect the detailed report to point us to those failed checks under HIGH severity.
Actual Behavior
We’ve noticed that the detailed report doesn’t explicitly list any HIGH findings. In fact, certain vulnerabilities categorized as LOW in the detailed report are contributing to the overall HIGH severity indicated in the summary.
Reproduction Steps
The
report all
Output does not show anyHIGH
findings but LOWs and MEDIUMs.Operating System
Linux
Version
Checklist
trivy image --reset
The text was updated successfully, but these errors were encountered: